Attempting to access sensitive information without need-to-know, Avoid talking about work outside of the workplace or with people without a need-to-know, Report the suspicious behavior in accordance with their organizations insider threat policy. CUI is an umbrella term that encompasses many different markings toidentifyinformationthat is not classified but which should be protected. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. difficult life circumstances such as substance abuse, divided loyalty or allegiance to the U.S., and extreme, persistent interpersonal difficulties. Based on the description that follows, how many potential insider threat indicator (s) are displayed? **Removable Media in a SCIF What must users ensure when using removable media such as compact disk (CD)? **Home Computer Security What should you consider when using a wireless keyboard with your home computer? 10-3 X-ray Interaction with Matter, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer. Remove and take it with you whenever you leave your workstation. WEKA Datasets, Classifier And J48 Algorithm For Decision Tree **Physical Security What is a good practice for physical security? You check your bank statement and see several debits you did not authorize. 5. Which of the following information is a security risk when posted publicly on your social networking profile? **Insider Threat Based on the description that follows, how many potential insider threat indicator(s) are displayed? A lock (LockA locked padlock) or https:// means youve safely connected to the .gov website. Cyber Awareness Challenge Knowledge Check 2023 Answers, Cyber Awareness Challenge 2022 Knowledge Check Answers. Sanitized information gathered from personnel records. Your health insurance explanation of benefits (EOB). What level of damage can the unauthorized disclosure of information classified as confidential reasonably be expected to cause? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? (Physical Security) which Cyberspace Protection Condition (CPCON) establishes a protection priority focus on critical and essential functions only? What should you do? After you have returned home following the vacation. Search for an answer or ask Weegy. Correct. Store it in a General Services Administration (GSA)-approved vault or container. While it may seem safer, you should NOT use a classified network for unclassified work.